Analysis

  • max time kernel
    150s
  • max time network
    117s
  • platform
    windows7_x64
  • resource
    win7-20240215-en
  • resource tags

    arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system
  • submitted
    01/05/2024, 04:12

General

  • Target

    df746d59666a1ec1edc8a079770e49987efeebe1103058ef8a7fce871d23f51e.exe

  • Size

    119KB

  • MD5

    220b8a1c62aa1f046189b598d98cc0b7

  • SHA1

    c433e04e39e736ececfdfd95a7d48d787f54e1d8

  • SHA256

    df746d59666a1ec1edc8a079770e49987efeebe1103058ef8a7fce871d23f51e

  • SHA512

    8e3e8353f8c7e7e19a67fc68dd900598d26f3b3b65903c20926c307597a04b25baf7ef871d1a30c00a64fd1597d2adeeba1407943d5156bf1b27bea4380404e6

  • SSDEEP

    1536:67Zf/FAlsM1++PJHJXFAIuZAIuekc9zBfA1OjBWgOI3uicwa+shcBEN2iqxtdSC5:+nymCAIuZAIuYSMjoqtMHfhfQ

Score
9/10

Malware Config

Signatures

  • Renames multiple (3466) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX dump on OEP (original entry point) 4 IoCs
  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\df746d59666a1ec1edc8a079770e49987efeebe1103058ef8a7fce871d23f51e.exe
    "C:\Users\Admin\AppData\Local\Temp\df746d59666a1ec1edc8a079770e49987efeebe1103058ef8a7fce871d23f51e.exe"
    1⤵
    • Drops file in Program Files directory
    PID:384

Network

        MITRE ATT&CK Matrix

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\$Recycle.Bin\S-1-5-21-2248906074-2862704502-246302768-1000\desktop.ini.tmp

          Filesize

          119KB

          MD5

          b3c5ed851d16263f3a32b017d88a98dc

          SHA1

          6c0a41038eeb25e6698c57a685df4c9472a9835b

          SHA256

          81e8009228598b0c6f0a05b273b5882d4af3528364d53d7008f9dafea8d056d3

          SHA512

          385c489ea22dcc9642797356fc96a15e531dae96895109421dd69ea9938803ce5cbeafcd18636bc2db63e2e3dff716f51602b78a31e19bba91a65ca0114ff7d6

        • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

          Filesize

          128KB

          MD5

          d9d090264b90178b53fc4ce774661719

          SHA1

          93360bcb12c3871338f462db1ec653dad5c51af5

          SHA256

          4e014a52f333d36c2626bc1c59575a88336b942614ca4d40e319686206b339c0

          SHA512

          009eb7e79ec22f5e5bf05ee9790f2b9d942260dc6cc379c6f89923634e86d8429a83781f61f87cbed6dd5a14fd53859b46da51142177f7ca223c491f2035982e

        • memory/384-0-0x0000000000400000-0x000000000040B000-memory.dmp

          Filesize

          44KB

        • memory/384-658-0x0000000000400000-0x000000000040B000-memory.dmp

          Filesize

          44KB